2/15/2011Harvard Bits1. 2/15/2011Harvard Bits2 US Telegraph “Network” in 1856.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
Network Layer and Transport Layer.
Chapter 3: Transport Layer
Copyright © 2002 Pearson Education, Inc. Slide 3-1 PERTEMUAN 5.
Introduction to Transport Layer. Transport Layer: Motivation A B R1 R2 r Recall that NL is responsible for forwarding a packet from one HOST to another.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Networking Support In Java Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 14 Introduction to Networks and the Internet.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Data Communications and Networking
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
OSI Model Routing Connection-oriented/Connectionless Network Services.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
Network Services Networking for Home & Small Business.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
1 Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 4: Search.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Transport Layer and UDP Tahir Azim Ref:
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
Chapter 3 Transport Layer
CS1Q Computer Systems Lecture 17 Simon Gay. Lecture 17CS1Q Computer Systems - Simon Gay2 The Layered Model of Networks It is useful to think of networks.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Transport Layer1 Ram Dantu (compiled from various text books)
Ch 1. Computer Networks and the Internet Myungchul Kim
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
CS1001 Lecture 7. Overview Computer Networks Computer Networks The Internet The Internet Internet Services Internet Services Markup Languages Markup Languages.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1. Layered Architecture of Communication Networks: TCP/IP Model
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
WAN Transmission Media
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
Communication Networks NETW 501 Tutorial 2
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
1 ** THE INTERNET ** Large, worldwide collection of networks that use a common protocol to communicate with each other A network of networks.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Instructor Materials Chapter 9: Transport Layer
Chapter 5 Network and Transport Layers
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
The OSI Model and the TCP/IP Protocol Suite
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
The OSI Model and the TCP/IP Protocol Suite
I. Basic Network Concepts
Chapter 20 Network Layer: Internet Protocol
Data Communication Networks
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

2/15/2011Harvard Bits1

2/15/2011Harvard Bits2 US Telegraph “Network” in 1856

2/15/2011Harvard Bits3

2/15/2011Harvard Bits4 Size of switch grows as square of number of telephones Impractical to centralize switching as number of telephones grows

 Historically a telephone call is completed by setting switches so there is a continuous electric circuit from telephone to telephone  Pros: Dedicated line means uninterrupted service once circuit is completed 2/15/2011Harvard Bits5

 Number of calls limited by size and number of switches  Long telephone lines are “seized” by the call even if no one is talking, one party hangs up, etc.  Hard to utilize alternative routes if a switch along the principal path is overloaded 2/15/2011Harvard Bits6

 Alternative, used by the Internet  Break message into data packets of 1-2KB  Address the packets to their destination and serial number them so they can be reassembled at the other end  Let network figure out how to deliver them  Different packets of same message may take different routes 2/15/2011Harvard Bits7

 Extremely efficient use of network lines - whenever a link is not transporting a packet it is available for completely unrelated messages  Size of switch depends on actual data traffic, not on the number of simultaneous communications that might be happening 2/15/2011Harvard Bits8

 No performance guarantees possible, so hard to be sure real-time communications will work  Routing algorithms are not obvious, though if they can be made adaptive, the network could heal itself in case of localized catastrophes  Seems to require more intelligence at the edge of the network, while circuit switching requires intelligence in the core and can tolerate dumb devices at the edge 2/15/2011Harvard Bits9

2/15/2011Harvard Bits10

2/15/2011Harvard Bits11 Client Computers Web Server Server pop.fas.harvard.edu Server smtp.fas.harvard.edu downloadupload THE INTERNET

 Router in network core receives incoming packets and stores them in “buffer” (temporary storage)  Routes packets on outgoing links  May throw packets away if buffer is full 2/15/2011Harvard Bits12 Routing Table

 Routers are relatively dumb and rely on intelligence at the edge to compensate 2/15/2011Harvard Bits13 Packetize Add serial #s Add fingerprint Add destination address Insert into network BEST EFFORT Reassemble packets (Maybe) report missing packets (Maybe) report damaged packets Deliver to application Client application: , web browser, iTunes Server application

 IPv4: 32 bits written as 4 decimal numerals less than 256, e.g (UMich)  4 billion not enough  IPv6: 128 bits written as 8 blocks of 4 hex digits each, e.g. AF43:23BC:CAA1:0045:A5B2:90AC:FFEE:8080  At edge, translate URLs --> IP addresses, e.g. umich.edu -->  Authoritative sites for address translation = “Domain Name Server” (DNS)  In the network core, IP addresses are used to route packets using routing tables 2/15/2011Harvard Bits14

2/15/2011Harvard Bits15

 We treat IP addresses as Non-Personal Information  We reserve the right to share Non-Personal Information with affiliates and other third parties. 2/15/2011Harvard Bits16

 ICANN = Internet Corporation for Assigned Names and Numbers  A US nonprofit … but it’s a long story. 2/15/2011Harvard Bits17

 Routers do not know what the bits in the packets represent  Do not know if they are , streaming video, html web pages  Do not know if they are encrypted or unencrypted  You can invent your own new service adhering to IP standards  Gain Internet’s best-effort service  and possibility of undelivered packets 2/15/2011Harvard Bits18

 Packet size (1.5 KB max) a compromise  Small enough that they can be “handled” quickly and with relatively low odds of being damaged  Large enough that packaging does not outweigh the contents or “payload” 2/15/2011Harvard Bits19

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Smallish packets also make better use of the network since later packets can leave before earlier packets arrive 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Store and Forward delays would add up if entire message had to be buffered at every router 2/15/2011Harvard Bits

 Creates logical connection between two machines on the edge of the network  Connected machines seem to have a circuit connecting them even though they do not tie up the network  Provide reliable, perfect transport of messages, even though IP may drop packets  Regulates the rate at which packets are inserted into the network 2/15/2011Harvard Bits37

2/15/2011Harvard Bits38

2/15/2011Harvard Bits39 1 2

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits * “3-Way Handshaking”

2/15/2011Harvard Bits “Virtual Circuit” now established between two hosts though the routers in between are not aware of it and the same path need not be followed by all packets

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits65 ACK

2/15/2011Harvard Bits66 ACK

2/15/2011Harvard Bits67 ACK ACK2

2/15/2011Harvard Bits68 ACK ACK2

2/15/2011Harvard Bits69 ACK ACK2 2

2/15/2011Harvard Bits ACK2

2/15/2011Harvard Bits ACK2

2/15/2011Harvard Bits ACK2

2/15/2011Harvard Bits73 12

2/15/2011Harvard Bits74 12

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits

2/15/2011Harvard Bits TIMEOUT

 Used for real-time applications (e.g. streaming audio and video) where timing is essential but perfect delivery is not 2/15/2011Harvard Bits84

2/15/2011Harvard Bits

2/15/2011Harvard Bits86 321

2/15/2011Harvard Bits87 312

2/15/2011Harvard Bits88 312

2/15/2011Harvard Bits89 31

2/15/2011Harvard Bits90 31

2/15/2011Harvard Bits91 3 1

2/15/2011Harvard Bits92 3 1

2/15/2011Harvard Bits93 31

 Both TCP (guaranteed delivery) and UDP (fast delivery, no guarantees) use the lower-level Internet Protocol in the “link layer”  But TCP and UDP know nothing about links, routing, etc. All that knowledge is embedded in IP 2/15/2011Harvard Bits94

2/15/2011Harvard Bits95 Higher Level Protocols Lower Level Protocols